Once you breached into a system, and from there to the network, you start to move inside searching for data that is interesting. You need to show your customer that their systems are vulnerable and that valuable data can be exfiltrated.
A post from a while back.